IKV Frontpage Slides (EN)
ID Management for the Internet of Things
Hardware-Based Security Solutions
VDP/ACP Application System Protection
Security framework is based on risk assessment
Researchers from Israel's Ben Gurion University of the Negev—who majorly focus on finding clever ways to exfiltrate data from an isolated or air-gapped computer—have now shown how fluctuations in the current flow "propagated through the power lines" could be used to covertly steal highly sensitive data.
A security flaw in Skype's updater process can allow an attacker to gain system-level privileges to a vulnerable computer.The bug, if exploited, can escalate a local unprivileged user to the full "system" level rights -- granting them access to every corner of the operating system.
At 2:57 a.m. on Friday morning in Tokyo, someone hacked into the digital wallet of Japanese cryptocurrency exchange Coincheck Inc. and pulled off one of the biggest heists in history.